Towards Trust-Aware Resource Management in Grid Computing Systems
2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02)
https://doi.org/10.1109/CCGRID.2002.1017189Abstract
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservative and implement techniques such as sandboxing, encryption, and other access control mechanisms on all elements of the Grid. However, the overhead caused by such a design may negate the advantages of Grid computing. This study examines the integration of the notion of "trust" into resource management such that the allocation process is aware of the security implications. We present a formal definition of trust and discuss a model for incorporating trust into Grid systems. As an example application of the ideas proposed, a resource management algorithm that incorporates trust is presented. The performance of the algorithm is examined via simulations.
References (14)
- A. Abdul-Rahman and S. Hailes, "Supporting trust in virtual communities," Hawaii Int'l Con- ference on System Sciences, 2000.
- F. Chang, A. Itzkovitz, and V. Karamcheti, "User-level resource-constrained sandboxing," 4th USENIX Windows Systems Symposium, Aug. 2000.
- S. E. Czerwinski, B. Y. Zhao, T. D. Hodes, A. D. Joseph, and R. H. Katz, "An architecture for a se- cure service discovery service," 5th Annual Int'l Conference on Mobile Computing and Networks (MobiCom '99), 1999.
- N. Damianou, N. Dulay, E. Lupu, and M. Slo- man, "The Ponder policy specification lan- guage," Workshop on Policies for Distributed Systems and Networks, 2001.
- I. Foster, C. Kesselman, and S. Tuecke, "The anatomy of the Grid: Enabling scalable virtual organizations," Int'l Journal on Supercomputer Applications, 2001.
- I. Foster and C. Kesselman, "The Globus project: A status report," 7th IEEE Heterogeneous Com- puting Workshop (HCW '98), Mar. 1998, pp. 4- 18.
- I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, "A security architecture for compu- tational Grids," ACM Conference on Computers and Security, 1998, pp. 83-91.
- I. Foster and C. Kesselman (eds.), The Grid: Blueprint for a New Computing Infrastructure, Morgan Kaufmann, San Fransisco, CA, 1999.
- I. Foster, A. Roy, and V. Sander, "A quality of service architecture that combines resource reservation and application adaptation," 8th Int'l Workshop on Quality of Service (IWQoS '00), June 2000.
- T. Grandison and M. Sloman, "A survey of trust in Internet applications," IEEE Communications Surveys & Tutorials, Vol. 3, No. 4, 2000.
- M. Maheswaran, S. Ali, H. J. Siegel, D. Hens- gen, and R. F. Freund, "Dynamic mapping of a class of independent tasks onto heterogeneous computing systems," Journal of Parallel and Distributed Computing, Vol. 59, No. 2, Nov. 1999, pp. 107-131.
- M. Maheswaran, "Quality of service driven resource management algorithms for network computing," 1999 Int'l Conference on Paral- lel and Distributed Processing Technologies and Applications (PDPTA '99), June 1999, pp. 1090- 1096.
- B. Misztal, "Trust in modern societies," Polity Press, Cambridge MA, Polity Press, Cambridge MA, 1996.
- B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edi- tion, John Wiley, New York, NY, 1996.